Global SA&D Approach for New Information Systems Architectures Security

نویسندگان

  • Mehdi Snene
  • Jorge Pardellas
چکیده

System security is often assimilated to a set of software solutions (Firewall, data encryption,..) but rarely consider the organizational security rules as a fundamental part of the IS security policy. With the increasing use of new IS architectures (Open architecture, distributed database, web server, multi-tier application servers) security leaks become crucial and every security problem is harmful to the organization business continuity. To reduce and detect major security risks at an earlier step of the IS project, our approach is based on different knowledge exchange between end users, analyst, designers and developers. The knowledge is mainly oriented to the detection of weak signals inside the organization. In this paper, we present the different knowledge surroundings an IS project and a knowledge pattern structure that can be used for the formalization aspects of the established exchange that should be established during the IS project between the different participants

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Review of BlockChain

Blockchain is an emerging technology for decentralized and transactional data sharing across a large network of untrusted participants. It enables new forms of distributed software architectures, where components can find agreements on their shared states without trusting a central integration point or any particular participating components. Considering the block- chain as a software connector...

متن کامل

A Review of BlockChain

Blockchain is an emerging technology for decentralized and transactional data sharing across a large network of untrusted participants. It enables new forms of distributed software architectures, where components can find agreements on their shared states without trusting a central integration point or any particular participating components. Considering the block- chain as a software connector...

متن کامل

A hybridization of evolutionary fuzzy systems and ant Colony optimization for intrusion detection

A hybrid approach for intrusion detection in computer networks is presented in this paper. The proposed approach combines an evolutionary-based fuzzy system with an Ant Colony Optimization procedure to generate high-quality fuzzy-classification rules. We applied our hybrid learning approach to network security and validated it using the DARPA KDD-Cup99 benchmark data set. The results indicate t...

متن کامل

Security Concerns in Egovernment Agent-based Interoperability

The use of Information and Communication Technology in the delivery of public services has a number of advantages. In a first approach, it allows productivity and quality improvements in the delivered services and it allows reductions on the running costs. Furthermore, with interoperability between dispersed IT systems, it is possible to deliver enhanced, combined services. The security on eGov...

متن کامل

VLSI implementation of shape-adaptive discrete wavelet transform

In this paper, several VLSI architectures and implementations of Shape-Adaptive Discrete Wavelet Transform (SADWT) with odd symmetric biorthogonal filters are presented. The hardware implementation issues of SA-DWT algorithm are first addressed, and one lifting scheme together with some appropriate shape information processing units is introduced for the 1-D SA-DWT architectures. These architec...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2006